scispace - formally typeset
Journal ArticleDOI

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

TLDR
This article provides a ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage system that can withstand collusion attack performed by revoked users cooperating with existing users and proves the security of the scheme under the divisible computation Diffie-Hellman assumption.
Abstract
With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly fine-grained file access control, attribute based encryption (ABE) was proposed and used in cloud storage system. However, user revocation is the primary issue in ABE schemes. In this article, we provide a ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage system. The issue of user revocation can be solved efficiently by introducing the concept of user group. When any user leaves, the group manager will update users’ private keys except for those who have been revoked. Additionally, CP-ABE scheme has heavy computation cost, as it grows linearly with the complexity for the access structure. To reduce the computation cost, we outsource high computation load to cloud service providers without leaking file content and secret keys. Notably, our scheme can withstand collusion attack performed by revoked users cooperating with existing users. We prove the security of our scheme under the divisible computation Diffie-Hellman assumption. The result of our experiment shows computation cost for local devices is relatively low and can be constant. Our scheme is suitable for resource constrained devices.

read more

Citations
More filters
Journal ArticleDOI

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage

TL;DR: This work formalizes the definition and security model, which model collusion attack executed by the existing users cooperating with the revoked users, and presents a user collusion avoidance ciphertext-policy ABE scheme with efficient attribute revocation for the cloud storage system.
Journal ArticleDOI

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage

TL;DR: The technique of certificateless signature is utilized to present a new RDPC protocol for checking the integrity of data shared among a group and the security of the scheme is reduced to the assumptions of computational Diffie-Hellman (CDH) and discrete logarithm (DL).
Journal ArticleDOI

Full Verifiability for Outsourced Decryption in Attribute Based Encryption

TL;DR: An ABE scheme with verifiable outsourced decryption is proposed, which can simultaneously check the correctness for transformed ciphertext for the authorized users and unauthorized users and is proved to be selective CPA-secure in the standard model.
Journal ArticleDOI

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

TL;DR: This paper provides a new efficient RDPC protocol based on homomorphic hash function that is provably secure against forgery attack, replace attack, and replay attack based on a typical security model and gives a new optimized implementation for the ORT, which makes the cost of accessing ORT nearly constant.
Journal ArticleDOI

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing

TL;DR: A Lightweight Fine-Grained ciphertexts Search (LFGS) system in fog computing is presented by extending Ciphertext-Policy Attribute-Based Encryption and Searchable Encryption technologies, which can achieve fine-grained access control and keyword search simultaneously.
References
More filters
Journal ArticleDOI

Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds

TL;DR: Novel modifications to attribute-based encryption are proposed to allow authorized users access to cloud data based on the satisfaction of required attributes such that the higher computational load from cryptographic operations is assigned to the cloud provider and the total communication cost is lowered for the mobile user.
Journal ArticleDOI

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

TL;DR: A privacy-preserving decentralized key-policy ABE scheme where each authority can issue secret keys to a user independently without knowing anything about his GID, which is the first decentralized ABE scheme with privacy- Preserving based on standard complexity assumptions.
Book ChapterDOI

Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles

TL;DR: This paper proposes a new multi-authority CP-ABE system which is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe.
Posted Content

Multi-authority attribute based encryption with honest-but-curious central authority.

TL;DR: In this paper, the authors proposed a multi-authority attribute-based encryption scheme, in which only the set of recipients defined by the encrypting party can decrypt a corresponding ciphertext.
Book ChapterDOI

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability

TL;DR: A practical large universe CP-ABE system supporting white-box traceability, which is suitable for commercial applications and proves the selective security of the new system in the standard model under "q-type" assumption.
Related Papers (5)